Organizations with established risk management processes can drive efficiency and improve their overall risk posture by leveraging open source tools.
While fraudsters have yet to master adversarial AI, the only way for the security community to get ahead of the emerging threat is through collaborative defense.
Security researchers uncovered two new ransomware strains that use open source tools to minimize their victims' odds of recovering their encrypted files.
Three Practical Tips That Empower Developers and Prevent Open Source Security Risks From Entering Your Code
There are many benefits to developing software using open source code, but these components can also introduce vulnerabilities into your code.
A new open source vulnerability called Devil's Ivy could enable attackers to hijack security camera feeds and block legitimate users from accessing data.
New enhancements to IBM's application security testing solutions enable clients to simplify SAST, remediate open source vulnerabilities and more.
The open source FreeRADIUS project recently patched a vulnerability that allowed malicious actors to bypass session authentication.
Application security testing is the only way to prevent open source vulnerabilities from becoming a huge problem in the enterprise.
A recent phishing campaign targeted GitHub developers with Dimnie malware, which enables fraudsters to alter open source code packages.
As part of HackerOne's effort to improve open source security, the vulnerability disclosure firm made its bug bounty program available for free.